Data Protocol Docs Logo

assessment

Evaluating Your Data Deletion Strategy

3 min read

Share this doc:


If data is not in your possession, it cannot be stolen, breached, or used improperly. So, a proper data deletion strategy is crucial to successfully reducing risk of exposure to data misuse or involvement by bad actors.

lightbulb icon

Remember, deletion means:

  • physically or logically destroying identifiable user data so that it cannot be recovered
  • anonymizing data so it cannot reasonably be re-identified by anyone at your company or anywhere else, even if it becomes publicly disclosed

Use this assessment to evaluate your data deletion process and make a plan to improve your data deletion practices. Read the following actions and select the option that best describes your data deletion strategy. If neither option applies to your organization, do not select a box and move on to the next.

Actions

You tag user records with a machine-readable tag like “to_be_deleted”, indicating that the record for this specific customer is to be deleted.

You can identify and delete all notes related to a user requesting that their data be deleted.

You can delete all third-party identities, corresponding identity graphs, and any data connected to cookies for those identities (e.g., Facebook, Google+).

You can delete any alternate email addresses associated with the user record.

You can delete all behavioral and inferred data related to a user requesting that their data be deleted.

Customer payment profiles are deleted.

Customers requesting deletion are unsubscribed from any email lists.

You have a process for identifying and blocking deletion when necessary.

You have a process for confirming that user records are completely, and successfully, deleted.

Scoring

0-9 You've got work to do

Your strategy for data deletion should be proactive. You should be prepared to delete user data completely - ideally automatically and at scale.

Engage with cross-functional stakeholders to review this assessment and determine next steps.

10-14 You're on the way

You've taken some important steps toward implementing a comprehensive data deletion strategy.

Meet with your cross-functional team and ask: What are we missing? Which internal, and/or external stakeholders do we need to consult to improve our data access strategy?

15-18 You're in a good position

You and your organization have built a solid foundation for managing data deletion and data access strategies.

Meet with your cross-functional team to evaluate any readiness points you didn't achieve. Are you in the best position to operationalize your data access deployment?

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.